1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
|
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
/*
* This target fuzzes NSS mpi against openssl bignum.
* It therefore requires openssl to be installed.
*/
#include "mpi_helper.h"
extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {
// We require at least size 3 to get two integers from Data.
if (size < 3) {
return 0;
}
mp_int a, b, c;
BN_CTX *ctx = BN_CTX_new();
BN_CTX_start(ctx);
BIGNUM *A = BN_CTX_get(ctx);
BIGNUM *B = BN_CTX_get(ctx);
BIGNUM *C = BN_CTX_get(ctx);
assert(mp_init(&a) == MP_OKAY);
assert(mp_init(&b) == MP_OKAY);
assert(mp_init(&c) == MP_OKAY);
size_t max_size = 4 * size + 1;
parse_input(data, size, A, &a);
// We can't divide by 0.
if (mp_cmp_z(&b) == 0) {
mp_clear(&a);
mp_clear(&b);
mp_clear(&c);
BN_CTX_end(ctx);
BN_CTX_free(ctx);
return 0;
}
// Compare with OpenSSL square mod
assert(mp_sqrmod(&a, &b, &c) == MP_OKAY);
(void)BN_mod_sqr(C, A, B, ctx);
check_equal(C, &c, max_size);
mp_clear(&a);
mp_clear(&b);
mp_clear(&c);
BN_CTX_end(ctx);
BN_CTX_free(ctx);
return 0;
}
|